SlideShare a Scribd company logo
Contents of linux Install and configure uninstall Commands samples
Introduction to linux This language was especially developed for creating the UNIX system. Using this new technique, it was much easier to develop an operating system that could run on many different types of hardware. Linux can be downloaded in its entirety from the Internet completely for free. No registration fees, no costs per user, free updates, and freely available source code in case you want to change the behavior of your system. LinusTorvalds, a young man studying computer science at the university of Helsinki, thought it would be a good idea to have some sort of freely available academic version of UNIX, and promptly started to code
Installation and configure
installation Installation Overview: It's wise to collect configuration information on your hardware before installing. Know the vendor and model number of each card in your machine; collect the IRQs and DMA channel numbers. You probably won't need this information -- but if it turns out you do, you'll need it very badly. If you want to run a "dual-boot" system (Linux and DOS or Windows or both), rearrange (repartition) your disk to make room for Linux. If you're wise, you'll back up everything first! .
First installation step The easy way: If you have an EIDE/ATAPI CDROM (normal these days), check your machine's BIOS settings to see if it has the capability to boot from CD-ROM. Most machines made after mid-1997 can do this. If yours is among them, change the settings so that the CD-ROM is checked first. This is often in a 'BIOS FEATURES' submenu of the BIOS configuration menus. Then insert the installation CD-ROM. Reboot. You're started.If you have a SCSI CDROM you can often still boot from it, but it gets a little more motherboard/BIOS dependent. Those who know enough to spend the extra dollars on a SCSI CDROM drive probably know enough to figure it out. The Hard Way Make installation floppies. Boot an installation mini-Linux from the floppies in order to get access to the  CD-ROM.
Installation Overview First Installation Steps: The Easy Way If you have an EIDE/ATAPI CDROM (normal these days), check your machine's BIOS settings to see if it has the capability to boot from CD-ROM. Most machines made after mid-1997 can do this. If yours is among them, change the settings so that the CD-ROM is checked first. This is often in a 'BIOS FEATURES' submenu of the BIOS configuration menus. Then insert the installation CD-ROM. Reboot. You're started.
Basic parts of an istallation kit Here are the basic parts of an installable distribution: The README and FAQ files. These will usually be located in the top-level directory of your CD-ROM and be readable once the CD-ROM has been mounted under Linux. (Depending on how the CD-ROM was generated, they may even be visible under DOS/Windows.) It is a good idea to read these files as soon as you have access to them, to become aware of important updates or changes. A number of bootdisk images (often in a subdirectory). If your CD-ROM is not   bootable, one of these is the file that you will write to a floppy to create the boot disk. You'll select one of the above bootdisk images, depending on the type of hardware that you have in your system.Basic Parts of an Installation Kit
Getting prepared for installation First, collect any manuals you have on your hardware -- motherboard, video card, monitor, modem, etc. -- and put them within easy reach. Second, gather detailed information on your hardware configuration. One easy way to do this, if you're running MS-DOS 5.0, or up, is to print a report from the Microsoft diagnostic utility msd.exe (you can leave out the TSR, driver, memory-map, environment-strings and OS-version parts). Among other things, this will guarantee you full and correct information on your video card and mouse type, which will be helpful in configuring X later on. Third, check your machine for configuration problems with supported hardware that could cause an un-recoverable lockup during Linux installation. It is possible for a DOS/Windows system using IDE hard drives andCD ROM to   be functional even with the master/slave jumpers on the drives incorrectly set. Linux won't fly this way. If in doubt, check your master-slave jumpers!
Configuration of linux The default Ubuntu configuration is easy enough to use for most users. If you use your computer more than most, you will inevitably want to configure Ubuntu to suit your tastes. If you have never used GNOME, you will want to learn the parts of the Ubuntu desktop. The top left of the desktop includes the menu bar, the centre of almost all configuration options. The other parts of the desktop are also explained on pages dealing with the top right and the bottom of the Ubuntu desktop. Unless you are perfectly content with the software that comes with Ubuntu, you will want to install more at some point. Most guides on the  Internet tell you how to use  " sudo apt-get" and other special incantations to install software. Ubuntu, however, comes with its own software installer called Synaptic. You can learn how to use it under "Adding Ubuntu Software and other linux software to ubuntu.
To help you further, you can enable Ubuntu to install software from more repositories than those that come as standard. By adding repositories, you can install non -official Ubuntu software. Further, you can scrap everything that comes with Ubuntu and install your own, customised repository list.Configure Ubuntu
Linux commands
Create directories mkdir - make directories usage: mkdir [OPTION] DIRECTORY Options: Create the DIRECTORY(ies), if they do not already exist. Mandatory arguments to long options are mandatory for short options too. -m, mode=MODE  set permission mode (as in chmod), not rwxrwxrwx - umask
-p, parents  no error if existing, make parent directories as needed -v, verbose  print a message for each created directory -help display this help and exit -version output version information and exit
To change directories cd -to change directories Use cd to change directories. Type cd followed by the name of a directory to access that directory.Keep in mind that you are always in a directory and can navigate to directories hierarchically above or below.
Move directories mv- change the name of a directory Type mv followed by the current name of a directory and the new name of the directory. Ex: mv testdir newnamedir
Present working directories pwd - print working directory will show you the full path to the directory you are currently in. This is very handy to use, especially when performing some of the other commands on this page. Remove directories rmdir - Remove an existing directory rm -r Removes directories and files within the directories recursively.
To change file owner and group chown - change file owner and group Usage: chown [OPTION] OWNER[:[GROUP]] FILE chown [OPTION] :GROUP FILE chown [OPTION] --reference=RFILE FILE Options: Change the owner and/or group of each FILE to OWNER and/or GROUP. With --reference, change the owner and group of each FILE to those of RFILE. -c, changes like verbose but report only when a change is made -L  traverse every symbolic link to a directory encountered -P  do not traverse any symbolic links (default)
-dereference affect the referent of each symbolic link, rather than the symbolic link itself -h, no-dereference affect each symbolic link instead of any referenced file (useful only on systems that can  change the ownership of a symlink) -from=CURRENT_OWNER:CURRENT_GROUP change the owner and/or group of each file only if its current owner and/or group match those specified here.  Either  may  be  omitted,  in which case a match is not required for the omitted attribute.
-no-preserve-root do not treat `/' specially (the default) -preserve-root fail to operate recursively on `/' -f, -silent, -quiet  suppress most error messages -reference=RFILE use RFILE's owner and group rather than the specifying OWNER:GROUP values -R, -recursive operate on files and directories recursively -v, -verbose output a diagnostic for every file processed The  following options modify how a hierarch
The  following options modify how a hierarchy The  following options modify how a hierarchy is traversed when the -R option is also specified. If more than one is specified, only the final one  takes effect. -H  if a command line argument is a symbolic link to a directory, traverse it  -L  traverse every symbolic link to a directory encountered -P  do not traverse any symbolic links (default)
Change file access permissions chmod - change file access permissions Usage: chmod [-r] permissions filenames r  Change the permission on files that are in the subdirectories of the directory that you are currently in.  permission  Specifies the rights that are being granted. Below is the different rights that you can grant in an alpha  numeric format.filenames  File or directory that you are associating the rights with Permissions
o - Other. a - All. r - Read the file. w - Write or edit the file. x - Execute or run the file as a program.
Short listing of directory contents ls - Short listing of directory contents -a  list hidden files -d  list the name of the current directory -F  show directories with a trailing '/' executable files with a trailing '*' -g  show group ownership of file in long listing -i  print the inode number of each file -l  long listing giving details about files  and directories -R  list all subdirectories encountered -t  sort by time modified instead of nam
Copy file command cp - Copy files cp  myfile yourfile Copy the files "myfile" to the file "yourfile" in the current working directory. This command will create the file "yourfile" if it doesn't exist. It will normally overwrite it without warning if it exists. cp -i myfile yourfile With the "-i" option, if the file "yourfile" exists, you will be prompted before it is overwritten. cp -i /data/myfile
Copy the file "/data/myfile" to the current working directory and name it "myfile". Prompt before overwriting the  file. cp -dpr srcdir destdir Copy all files from the directory "srcdir" to the directory "destdir" preserving links (-poption), file attributes (-p option), and copy recursively (-r option). With these options, a directory and all it contents can be copied to another dir
Cat command cat - Sends file contents to standard output. This is a way to list the contents of short files to the screen. It works well with piping. To display calendar: cal month year - Prints a calendar for the specified month of the specified year. To print contents of specified files: cat files - Prints the contents of the specified files.
Clear and compare between two files clear - Clears the terminal screen. cmp file1 file2 - Compares two files, reporting all discrepancies. Similar to the diff command, though the output format differs. diff file1 file2 - Compares two files, reporting all discrepancies. Similar to the cmp command, though the output format differs.
Extra commands To check sum: cksum [man page] - checksum and count the bytes in a file cp [man page] - copy files and directories To display date: date [man page] - print or set the system date and time dd [man page] - convert and copy a file du [man page] - estimate file space usage
fgrep [man page] - print lines matching a pattern find [man page] - search for files in a directory hierarchy fold [man page] - wrap each input line to fit in specified width G- grep [man page] - print lines matching a pattern
echo: Display message on screen, writes each given STRING to standard output, with a space between each and a newline after the last one. Syntax: echo [options]... [string]... exit: Exit from a program, shell or log out of a Unix network. Syntax: exit
Join: Join lines on a common field, writes to standard output a line for each pair of input lines that have identical join fields. SYNTAX: join [Options]... File1 File2 open: Open a file in its default application. Syntax: open Files...
passwd: Modify a user password. SYNTAX passwd [options...]  OPTIONS -d, --delete  delete the password for the named account (root only) -f, --force  force operation (effectively calls `chfn'?) -k, --keep-tokens  keep non-expired authentication tokens -l, --lock  lock the named account (root only)
-S, --status  report password status on the named account (root only) --stdin  read new tokens from stdin (root only) -u, --unlock  unlock the named account (root only) -?, --help  Show this help message --usage  Display brief usage message
How to uninstall linux Unstalling an operating system usually means leaving your system unbootable. Operating system will not work  without their boot files or if they are never called by the boot loader. therefore,to remove the presence of an operating system,it is enough to dereference it from the boot loader menu. Alternatively, you can also delete its files or replace them with another operating system.

More Related Content

PPT
Linux
Hema Prasanth
 
ODP
Sahul
sahul azzez m.i
 
PPT
1.2 boot the system v2
Acácio Oliveira
 
PDF
Part 4 of 'Introduction to Linux for bioinformatics': Managing data
Joachim Jacob
 
PPT
101 2.2 install boot manager
Acácio Oliveira
 
PDF
Linux Command Line Basics
We Ihaveapc
 
PPT
101 4.1 create partitions and filesystems
Acácio Oliveira
 
PPT
101 1.2 boot the system
Acácio Oliveira
 
1.2 boot the system v2
Acácio Oliveira
 
Part 4 of 'Introduction to Linux for bioinformatics': Managing data
Joachim Jacob
 
101 2.2 install boot manager
Acácio Oliveira
 
Linux Command Line Basics
We Ihaveapc
 
101 4.1 create partitions and filesystems
Acácio Oliveira
 
101 1.2 boot the system
Acácio Oliveira
 

What's hot (18)

PDF
Part 6 of "Introduction to linux for bioinformatics": Productivity tips
Joachim Jacob
 
PDF
linux-commandline-magic-Joomla-World-Conference-2014
Peter Martin
 
PDF
Linux Security Quick Reference Guide
wensheng wei
 
PDF
LINUX Admin Quick Reference
wensheng wei
 
PPTX
Linux Command Suumary
mentorsnet
 
PPT
101 1.1 hardware settings
Acácio Oliveira
 
PPT
Linux Commands
Ramasubbu .P
 
PPT
Linuxppt
TSUBHASHRI
 
ODP
Lamp ppt
Reka
 
PPT
101 4.3 control mounting and unmounting of filesystems
Acácio Oliveira
 
PPT
Linux commands
Hemakumar.S
 
PDF
Managing your data - Introduction to Linux for bioinformatics
BITS
 
PDF
Lpi 101 study_guide
ousman1
 
PDF
Part 2 of 'Introduction to Linux for bioinformatics': Installing software
Joachim Jacob
 
PDF
The structure of Linux - Introduction to Linux for bioinformatics
BITS
 
PPTX
Red hat linux essentials
Haitham Raik
 
PDF
Operating system lab manual
Meerut Institute of Technology
 
PDF
One Page Linux Manual
dummy
 
Part 6 of "Introduction to linux for bioinformatics": Productivity tips
Joachim Jacob
 
linux-commandline-magic-Joomla-World-Conference-2014
Peter Martin
 
Linux Security Quick Reference Guide
wensheng wei
 
LINUX Admin Quick Reference
wensheng wei
 
Linux Command Suumary
mentorsnet
 
101 1.1 hardware settings
Acácio Oliveira
 
Linux Commands
Ramasubbu .P
 
Linuxppt
TSUBHASHRI
 
Lamp ppt
Reka
 
101 4.3 control mounting and unmounting of filesystems
Acácio Oliveira
 
Linux commands
Hemakumar.S
 
Managing your data - Introduction to Linux for bioinformatics
BITS
 
Lpi 101 study_guide
ousman1
 
Part 2 of 'Introduction to Linux for bioinformatics': Installing software
Joachim Jacob
 
The structure of Linux - Introduction to Linux for bioinformatics
BITS
 
Red hat linux essentials
Haitham Raik
 
Operating system lab manual
Meerut Institute of Technology
 
One Page Linux Manual
dummy
 
Ad

Similar to Divya (20)

ODP
Sahul
sahul azzez m.i
 
PPT
Linux
Kavi Bharathi R
 
PDF
Basics of Linux
SaifUrRahman180
 
PPT
Linux
Rathan Raj
 
ODP
Lamp1
Reka
 
ODP
Lamp
Reka
 
ODP
Lamp1
Nadhi ya
 
PPT
Linux
Gouthaman V
 
PPT
Linux ppt
Sanmuga Nathan
 
PPT
Linux
SINGH PROJECTS
 
PPT
Unix/Linux Basic Commands and Shell Script
sbmguys
 
PDF
The one page linux manual
Craig Cannon
 
PDF
The one page linux manual
Saikat Rakshit
 
PDF
The Ultimate IBM and Lotus on Linux Workshop for Windows Admins
Bill Malchisky Jr.
 
PPTX
Introduction to Linux
Harish R
 
PPTX
Linux Presentation
Muhammad Qazi
 
DOCX
40 important command for linux
Md Abdullah Al Mamun
 
PDF
beginner.en.print
Aniruddh Tyagi
 
PDF
beginner.en.print
aniruddh Tyagi
 
Basics of Linux
SaifUrRahman180
 
Linux
Rathan Raj
 
Lamp1
Reka
 
Lamp
Reka
 
Lamp1
Nadhi ya
 
Linux ppt
Sanmuga Nathan
 
Unix/Linux Basic Commands and Shell Script
sbmguys
 
The one page linux manual
Craig Cannon
 
The one page linux manual
Saikat Rakshit
 
The Ultimate IBM and Lotus on Linux Workshop for Windows Admins
Bill Malchisky Jr.
 
Introduction to Linux
Harish R
 
Linux Presentation
Muhammad Qazi
 
40 important command for linux
Md Abdullah Al Mamun
 
beginner.en.print
Aniruddh Tyagi
 
beginner.en.print
aniruddh Tyagi
 
Ad

Recently uploaded (20)

PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Simple and concise overview about Quantum computing..pptx
mughal641
 

Divya

  • 1. Contents of linux Install and configure uninstall Commands samples
  • 2. Introduction to linux This language was especially developed for creating the UNIX system. Using this new technique, it was much easier to develop an operating system that could run on many different types of hardware. Linux can be downloaded in its entirety from the Internet completely for free. No registration fees, no costs per user, free updates, and freely available source code in case you want to change the behavior of your system. LinusTorvalds, a young man studying computer science at the university of Helsinki, thought it would be a good idea to have some sort of freely available academic version of UNIX, and promptly started to code
  • 4. installation Installation Overview: It's wise to collect configuration information on your hardware before installing. Know the vendor and model number of each card in your machine; collect the IRQs and DMA channel numbers. You probably won't need this information -- but if it turns out you do, you'll need it very badly. If you want to run a "dual-boot" system (Linux and DOS or Windows or both), rearrange (repartition) your disk to make room for Linux. If you're wise, you'll back up everything first! .
  • 5. First installation step The easy way: If you have an EIDE/ATAPI CDROM (normal these days), check your machine's BIOS settings to see if it has the capability to boot from CD-ROM. Most machines made after mid-1997 can do this. If yours is among them, change the settings so that the CD-ROM is checked first. This is often in a 'BIOS FEATURES' submenu of the BIOS configuration menus. Then insert the installation CD-ROM. Reboot. You're started.If you have a SCSI CDROM you can often still boot from it, but it gets a little more motherboard/BIOS dependent. Those who know enough to spend the extra dollars on a SCSI CDROM drive probably know enough to figure it out. The Hard Way Make installation floppies. Boot an installation mini-Linux from the floppies in order to get access to the CD-ROM.
  • 6. Installation Overview First Installation Steps: The Easy Way If you have an EIDE/ATAPI CDROM (normal these days), check your machine's BIOS settings to see if it has the capability to boot from CD-ROM. Most machines made after mid-1997 can do this. If yours is among them, change the settings so that the CD-ROM is checked first. This is often in a 'BIOS FEATURES' submenu of the BIOS configuration menus. Then insert the installation CD-ROM. Reboot. You're started.
  • 7. Basic parts of an istallation kit Here are the basic parts of an installable distribution: The README and FAQ files. These will usually be located in the top-level directory of your CD-ROM and be readable once the CD-ROM has been mounted under Linux. (Depending on how the CD-ROM was generated, they may even be visible under DOS/Windows.) It is a good idea to read these files as soon as you have access to them, to become aware of important updates or changes. A number of bootdisk images (often in a subdirectory). If your CD-ROM is not bootable, one of these is the file that you will write to a floppy to create the boot disk. You'll select one of the above bootdisk images, depending on the type of hardware that you have in your system.Basic Parts of an Installation Kit
  • 8. Getting prepared for installation First, collect any manuals you have on your hardware -- motherboard, video card, monitor, modem, etc. -- and put them within easy reach. Second, gather detailed information on your hardware configuration. One easy way to do this, if you're running MS-DOS 5.0, or up, is to print a report from the Microsoft diagnostic utility msd.exe (you can leave out the TSR, driver, memory-map, environment-strings and OS-version parts). Among other things, this will guarantee you full and correct information on your video card and mouse type, which will be helpful in configuring X later on. Third, check your machine for configuration problems with supported hardware that could cause an un-recoverable lockup during Linux installation. It is possible for a DOS/Windows system using IDE hard drives andCD ROM to be functional even with the master/slave jumpers on the drives incorrectly set. Linux won't fly this way. If in doubt, check your master-slave jumpers!
  • 9. Configuration of linux The default Ubuntu configuration is easy enough to use for most users. If you use your computer more than most, you will inevitably want to configure Ubuntu to suit your tastes. If you have never used GNOME, you will want to learn the parts of the Ubuntu desktop. The top left of the desktop includes the menu bar, the centre of almost all configuration options. The other parts of the desktop are also explained on pages dealing with the top right and the bottom of the Ubuntu desktop. Unless you are perfectly content with the software that comes with Ubuntu, you will want to install more at some point. Most guides on the Internet tell you how to use " sudo apt-get" and other special incantations to install software. Ubuntu, however, comes with its own software installer called Synaptic. You can learn how to use it under "Adding Ubuntu Software and other linux software to ubuntu.
  • 10. To help you further, you can enable Ubuntu to install software from more repositories than those that come as standard. By adding repositories, you can install non -official Ubuntu software. Further, you can scrap everything that comes with Ubuntu and install your own, customised repository list.Configure Ubuntu
  • 12. Create directories mkdir - make directories usage: mkdir [OPTION] DIRECTORY Options: Create the DIRECTORY(ies), if they do not already exist. Mandatory arguments to long options are mandatory for short options too. -m, mode=MODE set permission mode (as in chmod), not rwxrwxrwx - umask
  • 13. -p, parents no error if existing, make parent directories as needed -v, verbose print a message for each created directory -help display this help and exit -version output version information and exit
  • 14. To change directories cd -to change directories Use cd to change directories. Type cd followed by the name of a directory to access that directory.Keep in mind that you are always in a directory and can navigate to directories hierarchically above or below.
  • 15. Move directories mv- change the name of a directory Type mv followed by the current name of a directory and the new name of the directory. Ex: mv testdir newnamedir
  • 16. Present working directories pwd - print working directory will show you the full path to the directory you are currently in. This is very handy to use, especially when performing some of the other commands on this page. Remove directories rmdir - Remove an existing directory rm -r Removes directories and files within the directories recursively.
  • 17. To change file owner and group chown - change file owner and group Usage: chown [OPTION] OWNER[:[GROUP]] FILE chown [OPTION] :GROUP FILE chown [OPTION] --reference=RFILE FILE Options: Change the owner and/or group of each FILE to OWNER and/or GROUP. With --reference, change the owner and group of each FILE to those of RFILE. -c, changes like verbose but report only when a change is made -L traverse every symbolic link to a directory encountered -P do not traverse any symbolic links (default)
  • 18. -dereference affect the referent of each symbolic link, rather than the symbolic link itself -h, no-dereference affect each symbolic link instead of any referenced file (useful only on systems that can change the ownership of a symlink) -from=CURRENT_OWNER:CURRENT_GROUP change the owner and/or group of each file only if its current owner and/or group match those specified here. Either may be omitted, in which case a match is not required for the omitted attribute.
  • 19. -no-preserve-root do not treat `/' specially (the default) -preserve-root fail to operate recursively on `/' -f, -silent, -quiet suppress most error messages -reference=RFILE use RFILE's owner and group rather than the specifying OWNER:GROUP values -R, -recursive operate on files and directories recursively -v, -verbose output a diagnostic for every file processed The following options modify how a hierarch
  • 20. The following options modify how a hierarchy The following options modify how a hierarchy is traversed when the -R option is also specified. If more than one is specified, only the final one takes effect. -H if a command line argument is a symbolic link to a directory, traverse it -L traverse every symbolic link to a directory encountered -P do not traverse any symbolic links (default)
  • 21. Change file access permissions chmod - change file access permissions Usage: chmod [-r] permissions filenames r Change the permission on files that are in the subdirectories of the directory that you are currently in. permission Specifies the rights that are being granted. Below is the different rights that you can grant in an alpha numeric format.filenames File or directory that you are associating the rights with Permissions
  • 22. o - Other. a - All. r - Read the file. w - Write or edit the file. x - Execute or run the file as a program.
  • 23. Short listing of directory contents ls - Short listing of directory contents -a list hidden files -d list the name of the current directory -F show directories with a trailing '/' executable files with a trailing '*' -g show group ownership of file in long listing -i print the inode number of each file -l long listing giving details about files and directories -R list all subdirectories encountered -t sort by time modified instead of nam
  • 24. Copy file command cp - Copy files cp myfile yourfile Copy the files "myfile" to the file "yourfile" in the current working directory. This command will create the file "yourfile" if it doesn't exist. It will normally overwrite it without warning if it exists. cp -i myfile yourfile With the "-i" option, if the file "yourfile" exists, you will be prompted before it is overwritten. cp -i /data/myfile
  • 25. Copy the file "/data/myfile" to the current working directory and name it "myfile". Prompt before overwriting the file. cp -dpr srcdir destdir Copy all files from the directory "srcdir" to the directory "destdir" preserving links (-poption), file attributes (-p option), and copy recursively (-r option). With these options, a directory and all it contents can be copied to another dir
  • 26. Cat command cat - Sends file contents to standard output. This is a way to list the contents of short files to the screen. It works well with piping. To display calendar: cal month year - Prints a calendar for the specified month of the specified year. To print contents of specified files: cat files - Prints the contents of the specified files.
  • 27. Clear and compare between two files clear - Clears the terminal screen. cmp file1 file2 - Compares two files, reporting all discrepancies. Similar to the diff command, though the output format differs. diff file1 file2 - Compares two files, reporting all discrepancies. Similar to the cmp command, though the output format differs.
  • 28. Extra commands To check sum: cksum [man page] - checksum and count the bytes in a file cp [man page] - copy files and directories To display date: date [man page] - print or set the system date and time dd [man page] - convert and copy a file du [man page] - estimate file space usage
  • 29. fgrep [man page] - print lines matching a pattern find [man page] - search for files in a directory hierarchy fold [man page] - wrap each input line to fit in specified width G- grep [man page] - print lines matching a pattern
  • 30. echo: Display message on screen, writes each given STRING to standard output, with a space between each and a newline after the last one. Syntax: echo [options]... [string]... exit: Exit from a program, shell or log out of a Unix network. Syntax: exit
  • 31. Join: Join lines on a common field, writes to standard output a line for each pair of input lines that have identical join fields. SYNTAX: join [Options]... File1 File2 open: Open a file in its default application. Syntax: open Files...
  • 32. passwd: Modify a user password. SYNTAX passwd [options...] OPTIONS -d, --delete delete the password for the named account (root only) -f, --force force operation (effectively calls `chfn'?) -k, --keep-tokens keep non-expired authentication tokens -l, --lock lock the named account (root only)
  • 33. -S, --status report password status on the named account (root only) --stdin read new tokens from stdin (root only) -u, --unlock unlock the named account (root only) -?, --help Show this help message --usage Display brief usage message
  • 34. How to uninstall linux Unstalling an operating system usually means leaving your system unbootable. Operating system will not work without their boot files or if they are never called by the boot loader. therefore,to remove the presence of an operating system,it is enough to dereference it from the boot loader menu. Alternatively, you can also delete its files or replace them with another operating system.